First published: Tue Dec 20 2005(Updated: )
Interpretation conflict in YaBB before 2.1 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in YaBB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yabb | =2.0_rc2 | |
Yabb | =2.0_rc1 | |
Yabb | =1.40 | |
Yabb | =1_gold_-_sp_1 | |
Yabb | =1_gold_-_sp_1.3.2 | |
Yabb | =1_gold_-_sp_1.3 | |
Yabb | =1_gold_-_sp_1.4 | |
Yabb | =1_gold_-_sp_1.2 | |
Yabb | =1.41 | |
Yabb | =1_gold_release | |
Yabb | =2.0 | |
Yabb | =1_gold_-_sp_1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4426 is considered a high severity vulnerability due to its potential for script injection leading to cross-site scripting attacks.
To fix CVE-2005-4426, upgrade to YaBB version 2.1 or later which addresses this vulnerability.
CVE-2005-4426 affects users of YaBB versions 1.40, 1 Gold SP 1, 1.41, and 2.0 including earlier release candidates.
CVE-2005-4426 allows remote authenticated users to inject arbitrary web scripts or HTML, potentially leading to cross-site scripting.
CVE-2005-4426 can particularly affect users of Internet Explorer when they view the crafted files.